Collaborative Defense against Periodic Shrew DDoS Attacks in Frequency Domain

نویسندگان

  • YU CHEN
  • KAI HWANG
چکیده

The shrew or pulsing DDoS (Distributed Denial-of-Service) attacks, also known as RoQ (Reduction of Quality) attacks, are stealthy, periodic, and low-rate in volume. The shrew attacks could be even more detrimental to network resources than the flooding type of DDoS attacks. Shrew attacks appear periodically in low volume, thereby damaging the victim servers for a long time without being detected. This in turn leads to denying new visitors to the victim servers (which are mostly e-commerce sites). Hence, there is a pressing need to effectively detect shrew attacks in real-time, and to fend off these attacks at the victim sites at the earliest possible time. Unfortunately, there is still a void in research on effective detection of shrew DDoS attacks. In this paper, we propose a new digital signal processing (DSP) approach to detecting the shrew attacks embedded in legitimate traffic flows. We detect with the frequency-domain characteristics from the autocorrelation sequence of Internet traffic streams. This approach enables collaborative detection across multiple routers. The new detection scheme appeals to hardware implementation based on DSP technology. Our new detection technique requires only a few seconds for successful detection of shrew DDoS attacks. Furthermore, the technique entails only lightweight implementation in a real-life network environment. We developed a network-layer multicast protocol LocalCast to support collaborative detection without burdening the end hosts. The protocol adds more intelligence to active networks and enables the routers to filter out malicious traffic flows with minimum collateral damage to legitimate traffic flows. This frequencydomain defense scheme provides more robustness and intelligence in IP networks, which will enable the integration of more security functionality into Internet routers to protect sensitive applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Collaborative detection and filtering of shrew DDoS attacks using spectral analysis

This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and low-rate in attack volume, very different from the flooding type of attacks. They are launched with high narrow spikes in very low frequency, periodically. Thus, shrew attacks may endanger the victim systems for a long...

متن کامل

TCP Flow Analysis for Defense against Shrew DDoS Attacks

The shrew or RoS attacks are low-rate DDoS attacks that degrade the QoS to end systems slowly but not to deny the services completely. These attacks are more difficult to detect than the flooding type of DDoS attacks. In this paper, we explore the energy distributions of Internet traffic flows in frequency domain. Normal TCP traffic flows present some form of periodicity because of TCP protocol...

متن کامل

Title Filtering of shrew DDoS attacks in frequency domain

The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks could be even more detrimental than the widely known flooding DDoS attacks because they damage the victim servers for a long time without being noticed, thereby denying new visitors to the victim servers, which are mostly e-...

متن کامل

Filtering Shrew DDoS Attacks Using A New Frequency-Domain Approach

The stealthy shrew Distributed Denial of Services (DDoS) attacks, also known as Reduction of Quality (RoQ) attacks, could be even more detrimental than the more widely known flooding DDoS assaults. The reason is that such shrew attacks damage the victim servers for a long time without being noticed, thereby denying new visitors to the victim servers, which are mostly e-commerce sites. Thus, in ...

متن کامل

DiCoDefense: Distributed Collaborative Defense against DDoS Flooding attacks

Detecting Distributed Denial of Service (DDoS) flooding attacks as soon as possible before they affect the victims, identifying the sources of the attacks, and finally stopping them by blocking or rate limiting the attack traffic is the ultimate goal of current defense mechanisms. The success in detecting and responding to DDoS flooding attacks is highly dependent on the data monitored by the e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005